Listing Description
Company Description
FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,000 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.
Job Description
FireEye is seeking a SOC Manager in Houston, Texas. The SOC Manager will be in a supervisory role over the SOC Analysts and is accountable for all of the incidents tracked and investigated by the SOC team.
This is a technical position that requires advanced skills and experience in cyber forensics, malware analysis, network traffic analysis, cyber intelligence, cyber hunting, SOC engineering, and compliance support. The SOC Manager must be capable of leading large investigations, and organizing an incident response team to assist in containment and remediation efforts. Candidates for this position must be willing and capable of providing mentoring to junior members in the SOC team. The SOC Manager must be experienced in coordinating communications between teams during an incident response, comfortable with being a team leader, and effective at generating and publishing relevant SOC operations reports.
Candidates for this position must enjoy working as a member of a highly technical team in a rapidly changing environment, be innovative and creative in developing incident response tactics and techniques, comfortable with being a team leader, and passionate about protecting patient data and corporate assets from the diverse threats facing the healthcare industry.
Qualifications
At least 4 years of cyber security response experience on a SOC/CIRT team
Advanced experience performing forensics, malware reverse engineering, and penetration testing
Healthcare experience preferred
In-depth understanding of security issues across many different platforms and capability to articulate and communicate these issues to both technical and non-technical audiences
In-depth knowledge of forensic tools such as EnCase, FTK, Volatility, FireEye Helix, and Redline
In-depth knowledge of security tools such as SIEM, IDS/IPS, FireEye technologies, and firewalls
In-depth knowledge of network devices such as switches and routers
In-depth knowledge of Microsoft Windows systems including active directory
Knowledge of web application development such as ASP.NET, ASP, PHP. J2EE, JSP
Required flexibility to work nights, weekends, and/or holiday shifts in the event of an incident response emergency
Team-oriented and skilled in working within a collaborative environment
Experience leading SOC teams during cyber monitoring, hunting, and incident response investigations is required.
Excellent problem-solving abilities
Ability to effectively multi-task, prioritize and execute tasks in a high-pressure environment
Ability to present ideas in business-friendly and user-friendly languageLead and conduct real-time and historical analysis using security analytics tools, including FireEye technologies and digital forensics platforms.
Manage day-to-day activities of the SOC Team in regards to: Security Monitoring, Investigations and Response, and Threat and Vulnerability Intelligence
Manage incident investigations and responses involving advanced or complex threats.
Contribute to and lead improvements to the SOC monitoring, hunting, and incident management processes.
Primary author of weekly reports on technical KPI and key metric data to provide to SOC Manager. Provide SOC Manager monthly trending metrics of SOC operations.
Lead post-incident reviews.
Listing Details
- Citizenship: Us Citizen
- Incentives: Both
- Education: No Requirements
- Travel: No Travel
- Telework: No Telecommute